漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Dreampie Resty HttpClient HttpClient.java request path traversal
Vulnerability Description
A security vulnerability has been detected in Dreampie Resty up to 1.3.1.SNAPSHOT. This affects the function Request of the file /resty-httpclient/src/main/java/cn/dreampie/client/HttpClient.java of the component HttpClient Module. Such manipulation of the argument filename leads to path traversal. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Resty 路径遍历漏洞
Vulnerability Description
Resty是Go Resty开源的一个适用于 Go 的简单 HTTP 和 REST 客户端库。 Resty 1.3.1及之前版本存在路径遍历漏洞,该漏洞源于对参数filename的错误操作,可能导致路径遍历攻击。
CVSS Information
N/A
Vulnerability Type
N/A